Lecture

Sybil Attacks and Defenses

Description

This lecture covers Sybil attacks and defenses in permissionless consensus systems, focusing on fake identities, virtual nodes, social bots, sockpuppets, astroturfing, fake reviews, and ballot stuffing. The instructor also discusses defenses such as strong identity verification, biometrics, and the need for privacy.

About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.